Skip to content

Campaigns

ShadowMap tracks active and historical attack campaigns, linking them to threat actors, malware, targeted industries, and timelines. A campaign represents a coordinated series of attacks with a shared objective -- understanding campaigns helps your team see the bigger picture beyond individual IOCs and connect disparate indicators into a coherent threat narrative.

Overview

Campaigns

View Modes

The page supports two views, toggled via buttons in the header:

  • List View -- Sortable table with columns for bulk review and filtering. This is the default view.
  • Timeline View -- Visual chronological timeline showing campaigns plotted by date. Best for understanding temporal patterns and briefing stakeholders.

Understanding the Data (List View)

ColumnDescription
InfoCampaign name or description -- typically references the operation name, targeted industry, or attack method
DateWhen the campaign was active or first reported
Threat LevelSeverity assessment: High, Medium, Low, or Undefined
ActorsCount of threat actors attributed to this campaign (displayed as a tag; click through for details)
MalwareCount of malware families used in this campaign (displayed as a tag; click through for details)

Click any row to view the full campaign details, including the complete list of associated threat actors, malware, IOCs, targeted sectors, and a narrative description.

Filters

Use the filter bar in List View to narrow results:

FilterOptions
Threat LevelFilter by campaign severity (High, Medium, Low)
OrganizationFilter by the reporting organization that attributed the campaign
SearchFree-text search across campaign names and descriptions

Export

Click the export button to download the current filtered list view as an Excel file. The export respects all applied filters and search terms.

Timeline View

The timeline visualization displays campaigns as events on a horizontal axis, giving you:

  • Temporal clustering -- See when campaign activity peaks and whether your sector is being targeted in waves
  • Trend identification -- Identify whether campaign frequency is increasing or decreasing over time
  • Briefing material -- The timeline format is effective for executive presentations and board reports

How to Use Campaign Intelligence

Threat Assessment

When a new campaign is reported that targets your industry:

  1. Check the threat actors involved -- are they known to target your region?
  2. Review the malware used -- do you have detection coverage for those families?
  3. Check the campaign's IOCs against your environment using IOC Search
  4. Map the campaign's techniques to your ATT&CK coverage to identify gaps

Proactive Defense

  • Hunt -- Use campaign IOCs and TTPs to proactively search your SIEM and EDR for signs of compromise
  • Harden -- If a campaign exploits specific vulnerabilities, prioritize patching those CVEs
  • Detect -- Build detection rules covering the techniques used in campaigns targeting your sector
  • Brief -- Provide your security team with campaign summaries so they know what to watch for

Incident Correlation

During an active investigation, search campaigns for matching:

  • Malware families observed in your environment
  • IOCs from your forensic analysis
  • TTPs matching the attacker's behavior

Matching an incident to a known campaign provides attribution context and helps predict the attacker's next steps.

ShadowMap by Security Brigade